Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Paloalto Networks SecOps-Pro Dumps

Page: 1 / 6
Total 60 questions

Palo Alto Networks Security Operations Professional Questions and Answers

Question 1

An analyst identifies that a custom internal application is being incorrectly flagged as malicious by the Behavioral Threat Protection (BTP) module. What is the best way to stop these alerts while maintaining security for other applications?

Options:

A.

Disable the BTP module in the endpoint's Malware Profile.

B.

Add the application's file hash to the Global Block List.

C.

Create a specific Exception for the alert from the Incident View.

D.

Move the endpoint to a policy group with no security profiles.

Question 2

Which component of Cortex XDR is designed to detect insider threats?

Options:

A.

Forensics

B.

Identity Analytics

C.

Cloud Identity Engine

D.

Host Insights

Question 3

In Cortex XSOAR, what happens by default to an indicator (such as a malicious IP) once it reaches its configured expiration date?

Options:

A.

It is permanently deleted from the XSOAR database.

B.

It is moved to the "Archive" tab and cannot be used in playbooks.

C.

It remains in the system but is marked as "Expired" and no longer actively pushed to integrations.

D.

Its verdict is automatically changed from "Malicious" to "Benign".

Question 4

Why would a security engineer be unable to activate Cortex XDR analytics when configuring data sources and alert sensors during a Cortex XSIAM evaluation? (Choose one answer)

Options:

A.

The engineer needs to install the Analytics engine.

B.

Pathfinder must be activated before turning on analytics.

C.

Baseline requirements must be met before activating analytics.

D.

The engineer still needs to activate the identity Analytics engine.

Question 5

Which metric is used by SOC management to measure the average "Dwell Time"—the duration between a successful compromise and the moment it is first identified by a security tool or analyst?

Options:

A.

MTTR (Mean Time to Respond)

B.

MTTA (Mean Time to Acknowledge)

C.

MTTD (Mean Time to Detect)

D.

MTTC (Mean Time to Contain)

Question 6

During a sophisticated cyber attack, a company experiences a stealthy, multivector intrusion that evades detection by traditional security tools. The company requires a solution that will correlate and analyze the disparate attack indicators across its network, endpoints, and cloud environments to uncover the full scope of the breach and take immediate automated response actions. Which solution should be recommended?

Options:

A.

XDR

B.

SIEM

C.

EDR

D.

XSOAR

Question 7

What is the function of a Causality View?

Options:

A.

To provide users access to collaborate and execute CLI commands in Cortex XDR and Cortex XSIAM

B.

To present the alerts and process execution chain of all activity pertaining to the same event

C.

To consolidate multiple security tools into a single interface to improve analyst productivity

D.

To present alerts from multiple data sources as individual incidents in the console

Question 8

How does the "Unit 42 Intel" integration directly assist a SOC analyst within the Cortex XDR or XSIAM Incident view?

Options:

A.

It automatically resets the user's password in Active Directory.

B.

It provides a "threat card" with actor profiles, known aliases, and related MITRE ATT & CK techniques.

C.

It opens a 24/7 chat window with a dedicated Unit 42 forensic investigator.

D.

It provides the source code of the malware identified in the incident.

Question 9

What is required to enable ingestion of on-premises firewall logs into Cortex XDR?

Options:

A.

Broker VM

B.

API

C.

PAN-OS content pack

D.

Cloud Identity Engine

Question 10

According to the Traffic Light Protocol (TLP) 2.0 standard, which classification is used for information that is restricted to the specific individuals involved in an investigation and cannot be shared further?

Options:

A.

TLP:CLEAR

B.

TLP:GREEN

C.

TLP:AMBER

D.

TLP:RED

Question 11

Which dashboard or module in Cortex XSIAM provides visibility into unmanaged devices, unauthorized shadow IT, and cloud assets that do not currently have a Cortex agent installed?

Options:

A.

Host Insights

B.

Asset Inventory

C.

Cloud Discovery & Exposure

D.

Identity Analytics

Question 12

An analyst wants to create a detection rule that triggers when any process attempts to perform code injection into the lsass.exe process, regardless of whether the file hash of the source process is known to be malicious. Which type of rule should be created?

Options:

A.

IOC (Indicator of Compromise)

B.

BIOC (Behavioral Indicator of Compromise)

C.

Correlation Rule

D.

Analytics Alert

Question 13

Which Cortex XDR Exploit Prevention Module (EPM) is specifically designed to detect and block "Return-Oriented Programming" (ROP) techniques by monitoring for "stack pivoting" or "jump to return" instructions?

Options:

A.

Anti-Exploit Core

B.

JMP2RET / Stack Pivot Protection

C.

Local Privilege Escalation Protection

D.

DLL Security

Question 14

When writing a custom XQL query to hunt for specific network anomalies, which part of the query syntax is used to define the specific table or source of data being searched?

Options:

A.

filter

B.

dataset

C.

fields

D.

comp

Question 15

Which activities are facilitated through the War Room in Cortex XSOAR? (Choose one answer)

Options:

A.

Running security playbooks, scripts, and commands

B.

Creating, editing, and deleting tasks in the workplan

C.

Viewing a summary of case details and alerts

D.

Conducting initial investigation of incident data and threat intelligence

Question 16

Which scripting language will allow the use of the Query Builder in Cortex XDR to show the top five accounts with failed Windows logons in the past 24 hours? (Choose one answer)

Options:

A.

PowerShell

B.

JavaScript

C.

XQL

D.

Python

Question 17

Which SOC role investigates a new low severity alert? (Choose one answer)

Options:

A.

SOC manager

B.

Threat hunter

C.

Triage specialist

D.

Incident responder

Question 18

A customer is investigating a security incident in which unusual network traffic is observed and a malicious process is identified on an endpoint. Which Cortex XDR capability assists with correlating firewall network logs and endpoint data in this environment?

Options:

A.

Log stitching

B.

User authentication management

C.

Indicator of compromise (IOC) rule

D.

Analytics

Page: 1 / 6
Total 60 questions